The CMO Imperative: Adapting your 2020 strategy during the pandemic

Marketing leaders need to immediately embrace change and find creative solutions to add value with an increased emphasis on the digital world. This talk brings CMOs from around the US to share how they're adapting to our new reality with an emphasis on:
- Reaching your audience when travel is restricted and conferences are cancelled
- Adapting your content and standing out when everyone is doubling down on digital
- Pivoting your field marketing and event strategy to focus on digital opportunities
- Filling the lead gen and brand building gap
- Shifting channel strategies, plans, budget and resources
- Keeping your employees motivated during the crisis
- Messaging effectively around coronavirus

BrightTALK has teamed up with Boston Content, DC MarTech Talks and Obility B2B to deliver this special talk.

The healthcare industry already faces a number of unique challenges and threats. The data that these organizations collect includes extremely sensitive — and therefore valuable — information, making those organizations a target among cyberattackers. As telemedicine continues to grow, healthcare providers will have to address the proliferation of these threats, as well as the new cybersecurity concerns that come with a rise in adoption.

Join this webinar to learn about the current telemedicine landscape and the future risks and requirements healthcare organizations will need to address if they want to secure ongoing and evolving telemedicine initiatives. You’ll hear from James Carder, LogRhythm’s CSO and former healthcare security director, and Kevin McDonald, a healthcare cybersecurity advisor with decades of experience in the industry.

You’ll learn:

• The current state of telemedicine
• The cybersecurity threats specific to telemedicine
• Future risks and requirements of securing telemedicine
• Examples of how your team can best use its tools to monitor for these risks

Working with the DoD? The U.S. Department of Defense (DoD) requires that your organization meet the Cybersecurity Maturity Model Certification (CMMC) requirements to bid on contracts.

During this webinar, LogRhythm federal cybersecurity experts will discuss these new requirements and help your team prepare for CMMC certification.

You’ll learn:
- What the CMMC requirement is and if your organization needs certification
- An overview of the five certification levels
- When CMMC requirements will be required
- How to use LogRhythm’s downloadable mapping of NIST controls to CMMC practices
- Q&A panel

MITRE isn’t resting on their laurels with ATT&CK; they keep making it better. ATT&CK now includes cloud-specific content, and I don’t mean just generalized cloud guidance. Just like how ATT&CK has specific Techniques for Windows and Linux, ATT&CK’s cloud matrix defines Techniques specific to Office 365, Azure, AWS, Google, and others. It also covers most of the same Tactics found in the original ATT&CK matrix, including:

- Execution: Run malicious code
- Command and Control: Communicate with compromised systems to control them
- Impact: Where the adversary tries to manipulate, interrupt, or destroy your systems and data.

In addition, MITRE’s cloud matrix already has over 40 different documented Techniques, and in this real training for free ™ event, Randy Franklin Smith of Ultimate Windows Security will provide an overview of the matrix and show you how it fits into the overall ATT&CK framework.

Then, members of LogRhythm’s Threat Research team — Brian Coulson, Dan Kaiser, and Sally Vincent — demonstrate how you can use the following 5 cloud Techniques to identify anomalies in an Office 365 environment:

As the workforce has pivoted to a predominately remote work environment, a holistic security operations strategy is more imperative than ever. Organizations need to quickly assess and implement measures to mitigate and absorb risk. Parts of your security program might be working well, but there are likely areas where you could use sound guidance and advice from industry practitioners and proven leaders.

For the majority of us, our work routines have changed dramatically due to the novel coronavirus, COVID-19. Bad actors, looking to capitalize on the headlines, continue to accelerate their malicious efforts.

During this webinar, Rocky Rosas, Director of Sales Engineering - LogRhythm, and Val Wrenholt, OEM Partner Enablement Manager – Webroot will discuss how to implement safeguards as the workforce rapidly pivots to a remote environment.

We’ll also be joined by Tyler Moffit, Security Analyst at Webroot for a panelist Q&A session and tips on how best to proactively plan for threats to your data.

As a result of recent events and the COVID-19 pandemic, most organizations are implementing work-at-home policies. Yet company-wide remote environments present unique challenges for IT and cybersecurity professionals.

The two discussed the steps LogRhythm took to prepare for such an event and how they put that plan in action as remote work became necessary. Rex and Zack then answered questions to help you implement the same work-from-home environment while keeping IT and security best practices top of mind.

Topics covered during this webinar included:

- How LogRhythm prepared its IT and security operations to accommodate
a global work-from-home event
- A personalized Q&A session to help your IT and security teams accommodate a remote team
- How to balance business continuity with security measures
- IT and security implications to consider when implementing a work-at-home set-up

In light of COVID-19, we’ve seen businesses across industries implement remote work policies. This brings about new security concerns, many of which either weren’t considered or prioritized beforehand.

During this webinar LogRhythm experts including James Carder, CSO and VP of LogRhythm Labs, reviewed best practices for securing a remote workforce and what to expect when your employees make this kind of shift, whether it needs to happen now or in the future. Specific topics included:

- Getting started with log collection for remote systems
- Priority use cases you should employ, such as monitoring VPN access and collaboration security
- The types and levels of activity you should expect to see on your network, depending on your industry

We also discussed the impacts we’ve seen from the rush to support remote work due to COVID-19. These reveal lessons that others can implement now or work into a future plan to support a rise in remote workers.

Marketing leaders need to immediately embrace change and find creative solutions to add value with an increased emphasis on the digital world. This talk brings CMOs from around the US to share how they're adapting to our new reality with an emphasis on:
- Reaching your audience when travel is restricted and conferences are cancelled
- Adapting your content and standing out when everyone is doubling down on digital
- Pivoting your field marketing and event strategy to focus on digital opportunities
- Filling the lead gen and brand building gap
- Shifting channel strategies, plans, budget and resources
- Keeping your employees motivated during the crisis
- Messaging effectively around coronavirus

BrightTALK has teamed up with Boston Content, DC MarTech Talks and Obility B2B to deliver this special talk.

Women are rising through the cybersecurity ranks to become recognized leaders, experts, and mentors. The 2020 SANS Women in Cybersecurity Survey drew on the shared experiences of successful women in cybersecurity to provide practical advice on becoming leaders in their organizations.

Watch the webinar and learn why opportunities for women in security have never been better, including survey data points such as:

- More than 70% of respondents feel respected by their teammates

- 64% report that they are sought out for their opinions on cybersecurity issues

- 37% are advancing rapidly, moving into a senior position within one to four years

In this on-demand webcast, we discuss gender bias, the effects of mentorship, and practical advice on how to get ahead.

LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE.

Currently integrating with over three dozen Cisco products, LogRhythm provides centralized visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay in front of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.

Dabble or Deep Dive: 7 Different Threat Hunts You Can Do With Available Resources

In this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting. We will take into account that while some of you can devote most of your time to threat hunting, most of us have limited time and resources for this activity. The good news is that threat hunting is flexible and anyone can do it, ranging from a few hours a week to full-time.

As just one example, a great type of threat hunting is to look for unrecognized/suspicious executables running on you network. You can dip your toe in the water with this type of hunt with a small commitment of time and resources or you can plunge in deep with a major data collection and analysis effort. Starting out simple means you just focus on EXE names; baseline the EXE names being executed on your network, and then perform a daily review of new EXE names showing up for the first time. You can get this information from event ID 4688 and the query capabilities are very light. But I think you’ll be surprised what you are able to learn and catch.

We will take the same approach with a total of 7 types of threat hunting:

LogRhythm is sponsoring this real training for free event and Nathan Quist (aka “Q”) is helping me on this event. Q is LogRythm’s Threat Research Engineer and works with LogRhythm’s internal SOC team and its clients to perform deep dives into their environments to uncover threats facing our industry.

In this webinar, Optiv and LogRhythm discuss the current landscape of cybersecurity in the healthcare industry and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

Join Todd Weber, Chief Technology Officer at Optiv and James Carder, Chief Security Officer & VP of LogRhythm Labs as they discuss the current landscape of cybersecurity in the healthcare industry, and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

One of the common complaints I hear from security professionals is, “I don’t have the budget for that.” Do you know many of the tools that can solve problems in the enterprise are free, as in free beer? You don’t have to buy commercial products to secure your entire enterprise. Sure, there are some areas that do require a PO, however, there are also several areas of your security program that can be implemented using free and/or open source tools.

Learn which aspects of your security program can benefit the most from these tools, and how to configure and use them. (Free beer will NOT be provided during this webcast, however, you are encouraged to bring your own, as the presenter’s jokes may be funnier if you are enjoying an adult beverage.)

Steve Kaufman, a Technical Product Manager from LogRhythm, will be joining the webinar to cover how security technology vendors are aligning with open source tools. He’ll explore how LogRhythm’s architecture, including elasticsearch, enables the product to integrate with open source tools.

If the volume of data in your environment is expanding exponentially, you have likely been surprised to see a rise in your SIEM contract each year. You may have even had to make the difficult — and risky — decision of which data not to protect to stay within your budget. Starting now, you don’t have to.

With LogRhythm’s new True Unlimited Data Plan, your organization will pay one price to protect all data, users, and systems, even if those numbers increase year to year.

Join Optiv and LogRhythm as we discuss how the True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

This webinar will review how together, Optiv and LogRhythm can help you overcome the following challenges:

In this webinar, Optiv and LogRhythm discuss the current landscape of cybersecurity in the healthcare industry and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

Join Todd Weber, Chief Technology Officer at Optiv and James Carder, Chief Security Officer & VP of LogRhythm Labs as they discuss the current landscape of cybersecurity in the healthcare industry, and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

If the volume of data in your environment is expanding exponentially, you have likely been surprised to see a rise in your SIEM contract each year. You may have even had to make the difficult — and risky — decision of which data not to protect to stay within your budget. Starting now, you don’t have to.

With LogRhythm’s new True Unlimited Data Plan, your organization will pay one price to protect all data, users, and systems, even if those numbers increase year to year.

Join Optiv and LogRhythm as we discuss how the True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

This webinar will review how together, Optiv and LogRhythm can help you overcome the following challenges:

The MITRE ATT&CK framework is quickly becoming a focal point in the security world — and for good reason. This framework provides a consistent, industry-wide standard on which you can assess the effectiveness of your security monitoring and alerting capabilities.

In this webinar, we will zero in on using the MITRE ATT&CK framework to focus and prepare your threat detection capabilities.

Here are the 5 techniques we’ve selected, based off the tactic prevalence:

We’ll explore each one of these techniques with you, highlighting how the attackers use them and how you can detect them. We will discuss which logs you need to be collecting, what audit policy needs to enabled, and what you need to look for in those logs.These 5 techniques each come from a different Tactic category in ATT&CK, and relate to different phases in an attack’s lifecycle. Mature threat detection and response requires that you have capabilities across the threat lifecycle, from initial access through command and control and into exfiltration.

Dan Kaiser and Brian Coulson from, LogRhythm, will demonstrate how to use each of these techniques with an actual SIEM. Brian and Dan are part of a large project at LogRhythm Labs in which they are aligning MITRE ATT&ACK with their SIEM platform.

When coupled with a SIEM solution, the MITRE ATT&CK framework allows you to effectively test your security monitoring environment against attack techniques to validate that your technology and rules are truly working and alert you to the right anomalous behavior.

In this webinar, you’ll learn:

1. How to incorporate ATT&CK to work in your environment
2. Building out practical, technical threat detection
3. How to use SIEM technology and logs for threat hunting

The Cloud, The Cloud - What Security Products do you Need in the Cloud?

We’ve been hearing it for years, everything is moving to the cloud. Maybe not fully true, but there is a good amount of cloud migration projects all around us. What does this mean for security and security products?

In this webinar, Paul Asadoorian and Matt Alderman will discuss the evolution of cloud security products, including challenges, maturity, and latest trends. The pace and adoption of cloud security products have varied depending on the type of cloud you’re adopting (IaasS, PaaS, or SaaS).

Stephen Smith and Jeff Braucher from LogRhythm, will discuss the migration of security services/products to the cloud, including topics such as:

- What products should be heading for the cloud
- Thoughts on cloud service providers entering the security market
- Benefits/disadvantages to SaaS security products